IDS aur IPS mein kya farq hai?
Answer: IDS (Intrusion Detection System) network traffic ko monitor karta hai suspicious activity ke liye aur administrators ko alert karta hai, jabki IPS (Intrusion Prevention System) sirf detect nahi karta, balki potential threats ko prevent bhi karta hai malicious traffic ko block karke.OSI model ko describe kar sakte ho aur iske layers?
Answer: OSI model ke 7 layers hote hain: Physical, Data Link, Network, Transport, Session, Presentation, aur Application. Har layer ka ek specific role hota hai network communication mein.Suspicious network traffic ko kaise identify aur analyze karte ho?
Answer: Network traffic ko analyze karne ke liye tools jaise Wireshark use karte hain, jahan anomalies ya patterns ko dekhte hain jo potential threats indicate karte hain. Typical traffic baselines ko samajhna bhi zaroori hota hai.SIEM system ke key components kya hain?
Answer: SIEM (Security Information and Event Management) system ke core components hote hain: data collection, normalization, correlation, aur reporting.SIEM tool se detect ki gayi anomaly ko kaise investigate karte ho?
Answer: Investigation ke steps hote hain jaise alert ko verify karna, dusre data sources ke saath correlation karna, logs analyze karna, aur ye determine karna ki anomaly ek real threat hai ya nahi.False positive ka concept security alerts mein kya hota hai aur aap ise kaise handle karte ho?
Answer: False positive ek legitimate activity hoti hai jo galti se threat samajh li jaati hai. False positives ko minimize karne ke liye alert rules ko fine-tune karna aur context use karna zaroori hota hai.Firewall ka role network security mein kya hota hai?
Answer: Firewall network traffic ko control karta hai based on predetermined security rules, jo unauthorized access ko prevent karne mein help karta hai.DNS query kaise kaam karti hai aur DNS security kyun zaroori hai?
Answer: DNS query ek process hota hai jisme domain name ko IP address mein convert kiya jata hai. DNS security zaroori hai taaki DNS spoofing ya cache poisoning jaise attacks se bacha ja sake.Phishing attacks ke common techniques kya hain aur unke against kaise defend karte ho?
Answer: Phishing techniques jaise spear phishing aur baiting hoti hain. Inke against email filtering, user training, aur multi-factor authentication jaise defensive measures use kiye jaate hain.Data breach ke potential signs ko system mein kaise analyze karte ho?
Answer: Logs ko examine karte hain, network traffic ko monitor karte hain, unauthorized access check karte hain, aur forensic tools ka use karke potential data breaches ko detect karte hain.Zero-Day exploit kya hota hai, aur isse kaise protect karte ho?
Answer: Zero-Day exploit ek vulnerability hoti hai jo patch ya fix available hone se pehle hi exploit ki jaati hai. Protection strategies mein regular updates, threat intelligence, aur network segmentation included hote hain.Security incidents investigate karte waqt log management tools kaise use karte ho?
Answer: Log management tools ka use karke logs ko collect, store, aur analyze karte hain security incidents ko detect aur investigate karne ke liye.Symmetric aur asymmetric encryption mein kya farq hai?
Answer: Symmetric encryption mein same key use hoti hai encryption aur decryption ke liye, jabki asymmetric encryption mein public aur private key ka pair use hota hai secure communication ke liye.DDoS (Distributed Denial of Service) attack ko kaise handle aur respond karte ho?
Answer: DDoS attack mitigate karte waqt traffic analysis karte hain, malicious traffic ko filter karte hain, aur additional support ke liye ISP ya cloud providers ke saath collaborate karte hain.Effective incident response plan ke key elements kya hain?
Answer: Incident response plan mein preparation, detection, containment, eradication, recovery, aur lessons learned hote hain.Security posture kya hota hai aur ise kaise evaluate karte ho?
Answer: Security posture ek organization ke overall security status ko describe karta hai, aur ise risk assessments, security controls, aur compliance checks ke through evaluate kiya jaata hai.Common indicators of compromise (IOCs) jo aap dhyaan me rakhte ho, kya hote hain?
Answer: IOCs mein unusual IP addresses, system files mein changes, ya abnormal network traffic shamil hote hain, jo security incident ka indication de sakte hain.Threat intelligence ko apne role mein kaise use karte ho SOC Analyst ke roop mein?
Answer: Threat intelligence emerging threats ko samajhne, threat detection ko improve karne, aur response strategies ko inform karne mein help karta hai.Cybersecurity mein “kill chain” kya hota hai, aur ye incident response mein kaise help karta hai?
Answer: Kill chain attackers ke actions ka ek sequence hota hai jo system ko compromise karne ke liye follow karte hain. Isse samajhne se attacks ko detect aur disrupt karna asaan hota hai.Vulnerability assessment ka process kya hota hai?
Answer: Vulnerability assessment conduct karne ke steps mein scanning, vulnerabilities identify karna, risk analyze karna, aur remediation actions prioritize karna shamil hota hai.Encrypted traffic ko kaise handle aur analyze karte ho?
Answer: Encrypted traffic ko analyze karne ke liye SSL/TLS inspection tools ka use karte hain aur encrypted streams mein potential threats ko identify karne ki techniques apply karte hain.Network segmentation cybersecurity mein kyun zaroori hota hai?
Answer: Network segmentation attacks ko limit karne mein madad karta hai, kyunki network ko chhote isolated segments mein divide karte hain, jo overall security ko enhance karta hai.Compromised system par forensic analysis kaise perform karte ho?
Answer: Forensic analysis mein evidence collect karna, system artifacts ko analyze karna, aur data integrity ko preserve karna shamil hota hai.Security systems se detection ko evade karne ke common methods kya hain?
Answer: Attackers encryption, obfuscation, aur traffic manipulation jaise techniques use karte hain detection se bachne ke liye, aur inhe counteract karne ke liye advanced detection techniques apply karte hain.Least privilege principle kya hota hai aur cybersecurity mein iska significance kya hai?
Answer: Least privilege principle ka matlab hota hai ki users aur systems ko sirf unke kaam ke liye minimum access diya jaye, jo security risks ko reduce karta hai.Security baseline kya hota hai, aur ye kyun important hota hai?
Answer: Security baseline ek set of minimum security standards aur configurations hota hai, jo systems mein consistent security practices maintain karne ke liye zaroori hota hai.Security analysis mein legitimate aur malicious file ko kaise differentiate karte ho?
Answer: Files ko analyze karte waqt behavior, signatures, aur antivirus ya sandboxing tools ka use karke malicious activity ko identify karte hain.Multi-factor authentication (MFA) ka role security mein kya hota hai?
Answer: MFA ek additional layer of security provide karta hai multiple forms of verification ke through, jo unauthorized access ke risk ko reduce karta hai.Large volumes of log data ko efficiently kaise manage aur analyze karte ho?
Answer: Log aggregation, filtering, aur advanced analytics tools ka use karke large datasets ko manage aur relevant information identify karte hain.Security incident lifecycle kya hota hai aur ye response process ko kaise guide karta hai?
Answer: Security incident lifecycle mein preparation, detection, containment, eradication, recovery, aur lessons learned stages hote hain, jo response process ko guide karte hain.Sensitive data wale security incidents ko kaise handle karte ho?
Answer: Sensitive data wale incidents ko handle karte waqt data protection measures, regulations ki compliance, aur proper reporting follow karte hain.APT (Advanced Persistent Threat) aur typical cyber attack mein kya farq hai?
Answer: APTs long-term, targeted attacks hote hain, jisme sophisticated techniques use hoti hain, jabki typical cyber attacks short-term aur opportunistic hote hain.New system ya application ke liye risk assessment kaise perform karte ho?
Answer: Risk assessment karte waqt threats ko identify karte hain, vulnerabilities evaluate karte hain, aur risks ke impact aur likelihood ko assess karte hain.Network scanning aur vulnerability assessment ke liye kaunse tools use karte ho?
Answer: Network scanning aur vulnerability assessment ke liye tools jaise Nmap, Nessus, ya OpenVAS use karte hain, jo unke respective purposes ke liye design kiye jaate hain.Effective security policies kaise create aur maintain karte ho?
Answer: Security policies develop karne mein requirements identify karna, policies draft karna, unhe implement karna, aur regular reviews aur updates ensure karna zaroori hota hai.Emerging vulnerabilities aur exploits ke baare mein kaise informed rahte ho?
Answer: Vulnerabilities aur exploits ke baare mein informed rehne ke liye security bulletins subscribe karte hain, conferences attend karte hain, aur professional networks mein participate karte hain.Threat hunting ka role SOC environment mein kya hota hai?
Answer: Threat hunting proactively threats aur indicators of compromise ko search karne ka process hota hai, jo automated systems se detect nahi ho paate.Regulatory requirements ke compliance ko apni security practices mein kaise ensure karte ho?
Answer: Regulatory requirements ki compliance ensure karne ke liye regular audits, policy updates, aur documentation ka use karte hain.Common types of malware kya hote hain, aur inhe kaise detect karte ho?
Answer: Viruses, worms, Trojans, aur ransomware malware ke types hain. Inhe detect karne ke liye behavioral analysis aur signature-based detection use karte hain.Machine learning aur artificial intelligence ka cybersecurity mein kaise use karte ho?
Answer: Machine learning aur AI ka use threat detection, anomaly detection, aur automated response mein hota hai. Inka benefit ye hai ki ye rapidly evolving threats ko identify karte hain, lekin limitations bhi hoti hain.
Conclusion:
Technical interview questions ko master karna SOC Analyst ke career ko advance karne ke liye zaroori hai. Network security, incident handling, aur threat detection se related questions ke liye achi tarah se prepare karke aap apni technical proficiency aur problem-solving skills confidently showcase kar sakte hain.